In the context of Trojans, what is the definition of a Wrapper?
In the context of Trojans, what is the definition of a Wrapper?
Which of the following tool to grab a copy of it by sniffing?
When Jason moves a file via NFS over the company’s network, you want to grab a copy of it by sniffing. Which of the following tool accomplishes this?
What type of port scan is represented here?
What type of port scan is represented here.
How would you overcome the Firewall restriction on ICMP ECHO packets?
The traditional traceroute sends out ICMP ECHO packets with a TTL of one, and increments the TTL until the destination has been reached. By printing the gateways that generate ICMP time exceeded messages along the way, it is able to determine the path packets take to reach the destination.
The problem is that with the widespread use of firewalls on the Internet today, many of the packets that traceroute sends out end up being filtered, making it impossible to completely trace the path to the destination.
How would you overcome the Firewall restriction on ICMP ECHO packets?
Which are the easiest and most convincing ways to infect a computer?
Trojan horse attacks pose one of the most serious threats to computer security. The image below shows different ways a Trojan can get into a system. Which are the easiest and most convincing ways to infect a computer?
How do you defend against ARP Poisoning attack?
How do you defend against ARP Poisoning attack? (Select 2 answers)
What is the correct syntax?
Here is the ASCII Sheet.
You want to guess the DBO username juggyboy (8 characters) using Blind SQL Injection technique.
What is the correct syntax?
when using public computers and Internet Kiosks?
Keystroke logging is the action of tracking (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored.
How will you defend against hardware keyloggers when using public computers and Internet Kiosks? (Select 4 answers)
Which of the following Registry location does a Trojan add entries to make it persistent on Windows 7?
Which of the following Registry location does a Trojan add entries to make it persistent on Windows 7? (Select 2 answers)
Identify the correct statement related to the above Web Server installation?
Web servers are often the most targeted and attacked hosts on organizations’ networks. Attackers may exploit software bugs in the Web server, underlying operating system, or active content to gain unauthorized access.
Identify the correct statement related to the above Web Server installation?